default search action
J. William Atwood
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c50]Solmaz Jaberi, J. William Atwood, Joey Paquet:
ASSL as an Intent Expression Language for Autonomic Intent-Driven Networking. CNSM 2023: 1-5 - [c49]Parsa Ghaderi, J. William Atwood, Lata Narayanan:
Topology Discovery in Autonomic Networks. NOMS 2023: 1-7 - 2020
- [j26]Yaser M. Khamayseh, Wail Mardini, J. William Atwood, Monther Aldwairi:
Dynamic framework to mining Internet of Things for multimedia services. Expert Syst. J. Knowl. Eng. 37(5) (2020)
2010 – 2019
- 2019
- [j25]Shadi A. Aljawarneh, Aurea Anguera, John William Atwood, Juan Alfonso Lara, David Lizcano:
Particularities of data mining in medicine: lessons learned from patient medical time series data analysis. EURASIP J. Wirel. Commun. Netw. 2019: 260 (2019) - [c48]Mama Nsangou Mouchili, John William Atwood, Shadi A. Aljawarneh:
Call data record based big data analytics for smart cities. DATA 2019: 22:1-22:7 - 2018
- [j24]Salekul Islam, Nasif Muslim, J. William Atwood:
A Survey on Multicasting in Software-Defined Networking. IEEE Commun. Surv. Tutorials 20(1): 355-387 (2018) - [c47]Lin Chen, J. William Atwood:
Performance Evaluation for Secure Internet Group Management Protocol and Group Security Association Management Protocol. CCECE 2018: 1-5 - [c46]Yiqi Huang, J. William Atwood:
Security Analysis of Multicast/Unicast Router Key Management Protocols. CCECE 2018: 1-6 - [c45]Shadi A. Aljawarneh, Vangipuram Radhakrishna, John William Atwood:
Ultimate: unearthing latent time profiled temporal associations. DATA 2018: 29:1-29:8 - 2016
- [j23]Bing Li, J. William Atwood:
Secure receiver access control for IP multicast at the network level: Design and validation. Comput. Networks 102: 109-128 (2016) - [c44]Abonti Ferdous, J. William Atwood:
An architecture for a secured tunnel in the Automatic Multicast Tunneling (AMT) environment. CCECE 2016: 1-6 - [c43]Nitin Prajapati, J. William Atwood:
RPsec: Managing routing protocol security. CCECE 2016: 1-6 - 2015
- [j22]Revathi Bangalore Somanatha, J. William Atwood:
Router authentication, key management, and adjacency management for securing inter-router control messages. Comput. Networks 79: 68-90 (2015) - 2014
- [j21]Younchan Jung, Marnel Peradilla, J. William Atwood:
Secure Mobility Management Application Capable of Fast Layer 3 Handovers for MIPv6-Non-Aware Mobile Hosts. IEICE Trans. Commun. 97-B(7): 1375-1384 (2014) - 2013
- [c42]Younchan Jung, Marnel Peradilla, J. William Atwood:
Securing Domain Name System Combined with MIPv6 for Mobile Hosts. TrustCom/ISPA/IUCC 2013: 172-179 - 2011
- [j20]Younchan Jung, J. William Atwood:
VoIP Accounting Model: Using the Gap Ratio as a Quality Metric. IEICE Trans. Commun. 94-B(9): 2638-2641 (2011) - [j19]Xueyong Zhu, Zhiyong Wu, J. William Atwood:
A New Fuzzing Method Using Multi Data Samples Combination. J. Comput. 6(5): 881-888 (2011) - [c41]Ali Salem, J. William Atwood:
Formal validation of the security properties of AMT's three-way handshake. LCN 2011: 227-230 - [c40]Mohammad Parham, John William Atwood:
Validation of security for participant control exchanges in multicast content distribution. PST 2011: 156-163 - 2010
- [j18]Salekul Islam, J. William Atwood:
Sender access and data distribution control for inter-domain multicast groups. Comput. Networks 54(10): 1646-1671 (2010) - [j17]Malek M. Barhoush, J. William Atwood:
Requirements for enforcing digital rights management in multicast content distribution. Telecommun. Syst. 45(1): 3-20 (2010) - [i1]J. William Atwood, Salekul Islam, Maziar Siami:
Authentication and Confidentiality in Protocol Independent Multicast Sparse Mode (PIM-SM) Link-Local Messages. RFC 5796: 1-21 (2010)
2000 – 2009
- 2009
- [j16]Salekul Islam, J. William Atwood:
Multicast receiver access control by IGMP-AC. Comput. Networks 53(7): 989-1013 (2009) - 2008
- [j15]Younchan Jung, J. William Atwood, Hans-Jürgen Zepernick:
Improving VoIP Quality Using Silence Description Packets in the Jitter Buffer. IEICE Trans. Commun. 91-B(11): 3719-3721 (2008) - [c39]J. William Atwood, J. W. Im, Younchan Jung:
Asymmetric model for active measurements in the internet. ICUIMC 2008: 247-250 - [c38]Salekul Islam, J. William Atwood:
Receiver access control and secured handoff in mobile multicast using IGMP-AC. LCN 2008: 411-418 - 2007
- [j14]Ritesh Mukherjee, J. William Atwood:
Scalable solutions for secure group communications. Comput. Networks 51(12): 3525-3548 (2007) - [c37]Xueyong Zhu, J. William Atwood:
A Secure Multicast Model for Peer-to-Peer and Access Networks Using the Host Identity Protocol. CCNC 2007: 1098-1102 - [c36]Salekul Islam, J. William Atwood:
A Policy Framework for Multicast Group Control. CCNC 2007: 1103-1107 - [c35]Xueyong Zhu, J. William Atwood:
A Web Database Security Model Using the Host Identity Protocol. IDEAS 2007: 278-284 - [c34]J. William Atwood:
An Architecture for Secure and Accountable Multicasting. LCN 2007: 73-78 - [c33]Salekul Islam, J. William Atwood:
Sender Access Control in IP Multicast. LCN 2007: 79-86 - [c32]Yan Cheng, J. William Atwood:
Performance evaluation of qos-agent assisted mipv6 handoff scheme. Q2SWinet 2007: 55-62 - 2006
- [c31]Omar Banimelhem, Anjali Agarwal, J. William Atwood:
A New MPLS-based Local Failure Recovery for Multicast Communication. AICCSA 2006: 228-231 - [c30]Salekul Islam, J. William Atwood:
A Framework to Add AAA Functionalities in IP Multicast. AICT/ICIW 2006: 58 - [c29]Anshul Gupta, J. William Atwood:
Feedback Mechanism for MPLS Path Assignment using RSVP-TE. AICT/ICIW 2006: 61 - [c28]Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi:
A Survey of Secure B2C Commerce for Multicast Services. CCECE 2006: 288-293 - [c27]Anil Kumar Venkataiahgari, Mourad Debbabi, J. William Atwood:
Secure E-commerce Protection Profile. Security and Management 2006: 279-285 - [c26]Salekul Islam, J. William Atwood:
The Internet Group Management Protocol with Access Control (IGMP-AC). LCN 2006: 475-482 - [c25]Yan Cheng, J. William Atwood:
Towards Minimizing Service Degradation during MIPv6 Handovers. LCN 2006: 549-550 - [c24]Yan Cheng, J. William Atwood:
A hierarchical agent assisted MIPv6 handover scheme with QoS support. QSHINE 2006: 57 - [c23]Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi:
Secure E-Commerce Transactions for Multicast Services. CEC/EEE 2006: 18 - 2005
- [j13]Younchan Jung, J. William Atwood:
ß-Adaptive Playout Scheme for Voice over IP Applications. IEICE Trans. Commun. 88-B(5): 2189-2192 (2005) - [j12]Younchan Jung, J. William Atwood:
Switching between Fixed and Call-Adaptive Playout: A Per-Call Playout Algorithm. IEEE Internet Comput. 9(4): 22-27 (2005) - [c22]Omar Banimelhem, Anjali Agarwal, J. William Atwood:
A Tree Division Approach to Support Local Failure Recovery for Multicasting in MPLS Networks. Systems Communications 2005: 249-254 - [c21]Ritesh Mukherjee, J. William Atwood:
Multicast Group Authentication. Net-Con 2005: 215-230 - [c20]Omar Banimelhem, J. William Atwood, Anjali Agarwal:
Deploying Multicast Communication over MPLS Networks Using Tree Numbering. ISCC 2005: 704-710 - [c19]Israat Tanzeena Haque, Chadi Assi, J. William Atwood:
Randomized energy aware routing algorithms in mobile ad hoc networks. MSWiM 2005: 71-78 - 2004
- [j11]Ligang Wang, Anjali Agarwal, J. William Atwood:
Modelling and verification of interworking between SIP and H.323. Comput. Networks 45(2): 77-98 (2004) - [j10]J. William Atwood:
A classification of reliable multicast protocols. IEEE Netw. 18(3): 24-34 (2004) - [c18]Salekul Islam, J. William Atwood:
Security Issues in PIM-SM Link-Local Messages. LCN 2004: 402-403 - 2003
- [j9]Ritesh Mukherjee, J. William Atwood:
Rendezvous Point Relocation in Protocol Independent Multicast-Sparse Mode. Telecommun. Syst. 24(2-4): 207-220 (2003) - [c17]Ritesh Mukherjee, J. William Atwood:
Proxy Encryptions for Secure Multicast Key Management. LCN 2003: 377-384 - [c16]Ahmed Gario, J. William Atwood:
Feedback Mechanism Validation and Path Query Messages in the Label Distribution Protocol. LCN 2003: 480- - [c15]Ligang Wang, J. William Atwood, Anjali Agarwal:
Validation of SIP/H.323 Interworking Using SDL/MSC. SDL Forum 2003: 335-351 - 2000
- [c14]Ganesh Ramasivan, J. William Atwood:
A New Paradigm for Multipoint-to-Multipoint Communication Using XTP. LCN 2000: 352-361
1990 – 1999
- 1999
- [c13]J. William Atwood, Morteza Ghodrat, Dariusz Tasak:
Using Formal Specification and Observers to Specify and Validate the ATM Signaling Protocols. LCN 1999: 117-120 - 1996
- [j8]Anjali Agarwal, J. William Atwood:
A unified approach to fault-tolerance in communication protocols based on recovery procedures. IEEE/ACM Trans. Netw. 4(5): 785-795 (1996) - [c12]J. William Atwood, Octavian Catrina, John Fenton, W. Timothy Strayer:
Reliable Multicasting in the Xpress Transport Protocol. LCN 1996: 202-211 - 1995
- [c11]J. William Atwood, Y. Zhang:
A definition of the XTP service and its formal specification. LCN 1995: 459-468 - 1994
- [c10]J. William Atwood, Jean-Marc Jézéquel, Anindya Das, M'Hamed Nour:
Addressing and Routing in Heterogeneous Data Networks. HPN 1994: 95-105 - 1993
- [c9]J. William Atwood, Georges Chung Kam Chung:
Error control in the Xpress transfer protocol. LCN 1993: 423-431 - 1991
- [j7]J. William Atwood, Walter Prager:
A STREAMS-based Communications Subsystem in Turing Plus for Protocol Develelopment. Softw. Pract. Exp. 21(12): 1365-1380 (1991) - 1990
- [c8]Y. T. Cheung, J. William Atwood:
Specifying the Xpress Transfer Protocol Using Estelle and Valira. FORTE 1990: 503-517 - [c7]Jason X. G. Chen, J. William Atwood:
Performance of the Xpress transfer protocol in an Ethernet environment. LCN 1990: 292-300
1980 – 1989
- 1989
- [c6]K. Lall, J. William Atwood:
A microprogrammed interpreter for concurrent Euclid. MICRO 1989: 1-10 - 1988
- [c5]G. Bozikian, J. William Atwood:
CICS LSR Buffer Simulator (CLBS). Int. CMG Conference 1988: 493-503 - 1987
- [j6]Kin F. Li, Nikitas J. Dimopoulos, J. William Atwood:
The HM-Nucleus: Distributed Kernel Design for the Homogeneous Multiprocessor. IEEE Micro 7(1): 14-24 (1987) - [c4]Nikitas J. Dimopoulos, Kin F. Li, Eric Chi-Wah Wong, R. V. Dantu, J. William Atwood:
The Homogeneous Multiprocessor System, An Overview. ICPP 1987: 592-599 - 1984
- [j5]J. William Atwood:
Use of TUNIS in an Operating Systems Design Course. ACM SIGOPS Oper. Syst. Rev. 18(2): 6-7 (1984) - 1983
- [j4]Thiruvengadam Radhakrishnan, J. William Atwood, Suban G. Krishnamoorthy:
A Multilingual Input/Output Device for Indian Scripts. Int. J. Man Mach. Stud. 19(2): 137-146 (1983) - 1982
- [j3]J. William Atwood, Alexander MacLeod, Keh-Chiang Yu:
An empirical study of a CDC 844-41 disk subsystem. Perform. Evaluation 2(1): 29-56 (1982) - [c3]Bipin C. Desai, Clement Wing Hong Lam, J. William Atwood, Jaroslav Opatrny, Peter Grogono, S. Cabilio:
NOVAC: a non-tree variable tree for combinatorial computing. ICPP 1982: 193-195 - 1981
- [c2]J. William Atwood, Eric Regener:
Teaching subsets of Pascal. SIGCSE 1981: 96-103
1970 – 1979
- 1976
- [j2]J. William Atwood:
Concurrency in Operating Systems. Computer 9(10): 18-26 (1976) - 1974
- [e1]John H. Howard Jr., Philip J. Kiviat, James D. Connell, Stuart Trask, J. William Atwood:
Proceedings of the 1974 ACM SIGMETRICS conference on Measurement and evaluation, SIGMETRICS 1974, USA, 1974. ACM 1974, ISBN 978-1-4503-7377-7 [contents] - 1973
- [j1]J. William Atwood:
I/O supervision in the project sue operating system. Computer 6(11): 19-24 (1973) - 1972
- [c1]Kenneth C. Sevcik, J. William Atwood, Marc S. Grushcow, Richard C. Holt, James J. Horning, Dennis Tsichritzis:
Project SUE as a learning experience. AFIPS Fall Joint Computing Conference (1) 1972: 331-338 - 1970
- [b1]John William Atwood:
Pulse Interval Representations of Speech Events. University of Illinois Urbana-Champaign, USA, 1970
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-15 00:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint